Analysis
-
max time kernel
145s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 19:22
Behavioral task
behavioral1
Sample
94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe
Resource
win10v2004-20220901-en
General
-
Target
94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe
-
Size
417KB
-
MD5
ca96317168cbf4942c481d5a8a2df788
-
SHA1
c0f02cfd74165edb004eddb30d9a2ac88cc8ba06
-
SHA256
94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3
-
SHA512
46b1a4ea84d742561527b861c96d4608497f02518b32b0ae94e4f46ac87c194ae8f2517856bbc7eb9cdf0cd9220ddef257687949a95ca6aba8fc041d06c29a25
-
SSDEEP
6144:XW4WRkxlYts/NZiDNvk2Qppw/ePFeNfuGsGp90MgzQazjkg83ONGIk2q+cCr6se:G4WRknYYN0G/pp+EFEN0dQazM3Og1
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Spy-Net = "C:\\Windows\\system32\\Spy-Net\\server.exe" 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Spy-Net = "C:\\Windows\\system32\\Spy-Net\\server.exe" 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{H2U82K7X-U87L-T02H-7AQ1-WJ4AOQX354CG}\StubPath = "C:\\Windows\\system32\\Spy-Net\\server.exe Restart" 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{H2U82K7X-U87L-T02H-7AQ1-WJ4AOQX354CG} 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe -
resource yara_rule behavioral2/memory/3376-132-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral2/memory/3376-134-0x0000000010410000-0x0000000010492000-memory.dmp upx behavioral2/memory/3376-139-0x00000000104A0000-0x0000000010522000-memory.dmp upx behavioral2/memory/3312-143-0x00000000104A0000-0x0000000010522000-memory.dmp upx behavioral2/memory/3312-144-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral2/memory/3376-145-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral2/memory/3376-142-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral2/memory/3312-146-0x00000000104A0000-0x0000000010522000-memory.dmp upx behavioral2/memory/3312-147-0x0000000003B70000-0x0000000003C32000-memory.dmp upx behavioral2/memory/3312-148-0x0000000003F60000-0x0000000004022000-memory.dmp upx behavioral2/memory/3312-149-0x0000000004130000-0x00000000041F2000-memory.dmp upx behavioral2/memory/3312-150-0x0000000004300000-0x00000000043C2000-memory.dmp upx behavioral2/memory/3312-151-0x00000000044D0000-0x0000000004592000-memory.dmp upx behavioral2/memory/3312-152-0x00000000046A0000-0x0000000004762000-memory.dmp upx behavioral2/memory/3312-153-0x0000000004870000-0x0000000004932000-memory.dmp upx behavioral2/memory/3312-154-0x00000000104A0000-0x0000000010522000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Spy-Net = "C:\\Windows\\system32\\Spy-Net\\server.exe" 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Spy-Net = "C:\\Windows\\system32\\Spy-Net\\server.exe" 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Spy-Net\server.exe 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe File opened for modification C:\Windows\SysWOW64\Spy-Net\plugin.dat 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe File opened for modification C:\Windows\SysWOW64\Spy-Net\ 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe File created C:\Windows\SysWOW64\Spy-Net\logs.dat 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe File opened for modification C:\Windows\SysWOW64\Spy-Net\logs.dat 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe File created C:\Windows\SysWOW64\Spy-Net\plugin.dat 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe File created C:\Windows\SysWOW64\Spy-Net\server.exe 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe -
Checks SCSI registry key(s) 3 TTPs 8 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3312 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe Token: SeDebugPrivilege 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe Token: SeDebugPrivilege 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe Token: SeDebugPrivilege 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe Token: SeDebugPrivilege 3312 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe Token: SeDebugPrivilege 3312 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80 PID 3376 wrote to memory of 360 3376 94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe"C:\Users\Admin\AppData\Local\Temp\94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:360
-
-
C:\Users\Admin\AppData\Local\Temp\94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exeC:\Users\Admin\AppData\Local\Temp\94c8a2393d33911a15720036b7a635c1e3249069bc8894f8a1672a3720073ca3.exe2⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
- Checks SCSI registry key(s)
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3312
-